Month: January 2014

We Can Help To Protect You and Your Business Reputation. As a retail organization, large or small, you must protect your sensitive customer data. It’s mandatory for you to do this to comply with the Payment Card Industry Data Security Standard (PCI DSS), and to maintain your good standing with customers. Retail establishments today are

New memory-scraping malware was recently released to steal payment card data from point-of-sale (PoS) systems. According to cyber security firm, IntelCrawler, the malware, known as Decebal can steal encrypted data on the magnetic stripe of credit or debit cards. What makes this new malware different from previous forms of memory-scraping malware? The practice of a

What would happen to your business if a natural disaster ruined your equipment or your employees couldn’t get to the office? Most businesses would experience a significant loss in revenue and customer confidence It’s critical to have a business continuity plan in place before a disaster so you can quickly recover. Disasters occur more often

On January 25th, 2014, Michaels, the world’s largest arts-and-crafts retailer, announced that it “recently learned of possible fraudulent activity on some U.S. payment cards that had been used,” suggesting they had experienced a data breach. Christina Moyer, a customer in Illinois, sued the company for failing to properly safeguard her confidential data. According to Moyer,

Just short of bringing you coffee, the new Google Now feature acts like a personal assistant. Compare it to Apple’s Suri, but on steroids. Google Now can react to voice inquiries; proactively alert you of useful information such as traffic jams or warn of package delivery to your door and much more. Proactive means it

The Target and Neiman Marcus (and now Michaels) data breaches generated a lot of concern for retail businesses. The data breaches were caused by memory-scraping malware that’s designed to steal customer names, credit cards numbers, and other personal information. What you should do to prevent these attacks: Upgrade outdated software to prevent infection from malware

Coca-Cola Experiences a Data Breach After An Employee Steals Laptops. Coca-Cola has admitted to a data breach after an employee stole dozens of laptops over the course of six years. The stolen laptops went unnoticed and contained the sensitive data of 74,000 individuals. The employee stole a total of 55 laptops from Coca-Cola’s Atlanta offices;

Microsoft will continue to update security software for its 12-year old Windows XP operating system until July 14th, 2015. Previously, they were planning to end support by April 8th, 2014. But they decided to extend the deadline because so many organizations were behind on the migration process. The extended support applies to the following: System

The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target stores over the 2013 holiday shopping season. Now Michael’s Craft Store, the largest arts and crafts dealer in the U.S. suspects it has

Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning is necessary to minimize these risks and protect your valuable data. In today’s technology-driven world, most businesses rely on IT to perform critical operational functions. Essentially, information technology is embedded